Re: Last Call: <draft-ietf-dnsop-onion-tld-00.txt> (The .onion Special-Use Domain Name) to Proposed Standard

[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]

 



Also what I haven't seen explored but is actually a logical extension
of using socks to make ordinary browsers talk to .onion sites is
extending the local recursive server to do the TOR lookup rather
than a traditional DNS lookup and return the results in a DNS
message.  With dprive this should end up being secure.

Doesn't work because the underlying protocol isn't TCP. It can work in SOCKS because that's an application layer gateway which can recognize .onion as special and set up a TOR session rather than a TCP session.

I suppose the recursive server could return an address in 169.254.0.0/16 and run a proxy between a link-local TCP session and TOR, but ugh.

Regards,
John Levine, johnl@xxxxxxxxx, Taughannock Networks, Trumansburg NY
Please consider the environment before reading this e-mail.




[Index of Archives]     [IETF Annoucements]     [IETF]     [IP Storage]     [Yosemite News]     [Linux SCTP]     [Linux Newbies]     [Fedora Users]